Intel corporation (20240214185). PROTECTING SECRET PROCESSING, SECRET INPUT DATA, AND SECRET OUTPUT DATA USING ENCLAVES simplified abstract

From WikiPatents
Revision as of 00:40, 28 June 2024 by Wikipatents (talk | contribs) (Creating a new page)
(diff) ← Older revision | Latest revision (diff) | Newer revision → (diff)
Jump to navigation Jump to search

PROTECTING SECRET PROCESSING, SECRET INPUT DATA, AND SECRET OUTPUT DATA USING ENCLAVES

Organization Name

intel corporation

Inventor(s)

Zhiqiang Li of Beijing (CN)

Daniel Middleton of Orono MN (US)

Dan He of Shanghai (CN)

Yiqi Chen of Shanghai (CN)

PROTECTING SECRET PROCESSING, SECRET INPUT DATA, AND SECRET OUTPUT DATA USING ENCLAVES - A simplified explanation of the abstract

This abstract first appeared for US patent application 20240214185 titled 'PROTECTING SECRET PROCESSING, SECRET INPUT DATA, AND SECRET OUTPUT DATA USING ENCLAVES

Simplified Explanation: This patent application describes a method and apparatus for protecting secret input data, processing, and output data by utilizing signed private and manager enclaves.

Key Features and Innovation:

  • Receiving signed private and manager enclaves from respective owners and trusted third parties.
  • Deploying the signed manager enclave and protected code loader key.
  • Running secret processing in the signed private enclave to generate encrypted secret output data.
  • Encrypting the secret output data and ephemeral key in the signed private enclave before sending it to the signed manager enclave.

Potential Applications: This technology can be applied in secure data processing environments, confidential communication systems, and encrypted data storage solutions.

Problems Solved: This technology addresses the need for secure handling of sensitive data, protection against unauthorized access, and secure transmission of encrypted information.

Benefits: The benefits of this technology include enhanced data security, protection of confidential information, and secure processing of sensitive data.

'Commercial Applications: Secure data processing systems, encrypted communication platforms, and confidential data storage services can benefit from this technology to ensure the protection of sensitive information.

Questions about the Technology: 1. How does the use of signed private and manager enclaves enhance data security in this technology? 2. What are the potential implications of deploying this technology in industries that handle sensitive information?

Frequently Updated Research: Stay updated on advancements in secure data processing technologies, encryption methods, and confidential data handling practices to enhance the effectiveness of this innovation.


Original Abstract Submitted

an apparatus and method of protect secret input data, secret processing, and secret output data by receiving a signed private enclave from a secret processing owner; receiving a signed manager enclave from a trusted third party (ttp); deploying the signed manager enclave; receiving a protected code loader (pcl) key encrypted with an encryption public key of the signed manager enclave from the secret processing owner; deploying the signed private enclave; running secret processing in the signed private enclave with secret input data to generate secret output data; and encrypting the secret output data in the signed private enclave using an ephemeral key, encrypting the ephemeral key in the signed private enclave using an encryption public key of the signed manager enclave, and sending the encrypted secret output data and the encrypted ephemeral key to the signed manager enclave.